Problem Session CMPE-552 Database and File Security, 19.12.2012

advertisement
Problem Session CMPE-552 Database and File Security,
19.12.2012
1. Why Simple Digital Cash protocol does not provide anonymity to
customer?
2. What does it mean – “blinded token”? Why it is called so?
3. How blinding/unbliding is made?
4. What is XML encryption?
5. What is XML signature?
6. Kerberos: What is Kerberos realm?
7. Kerberos: How Kerberos can be generalized to Kerberos realms?
8. Kerberos: What assumptions are used in implementation of Kerberos realms
interoperation?
9. Kerberos: Why, in description of Figure 14.2, timestamp TS5 is not shown?
10. X.509: How many versions are known and what are the differences between
them?
11. X.509: What is certificate authority?
12. X.509: What is certificate?
13. X.509: What for X.509 is intended?
14. X.509: Why unique subject identifier may be useful?
15. X.509: What is digital signature?
16. X.509: What notation in X.509 is used to specify digital signature?
17. X.509: What notation is used in X.509 to specify certificate?
18. X.509: What is the difference between signature algorithm identifier and
signature?
19. X.509: Why no party other than the CA can modify the certificate without this
being detected?
20. X.509: What are assumptions about X.509 directory?
21. X.509: What is the problem in establishing trusted communications between
users?
22. X.509: What is certificate path?
23. X.509: How can certificate paths be used to establish trusted communication?
24. X.509: What is CA hierarchy? What are the elements of it and their intention?
How CA hierarchy can be used to establish trusted communication?
25. X.509: How time can be saved for establishing of two way secure
communication? What should contain initial message of initiating party?
26. X.509: What are the reasons for certificate revocation?
27. X.509: What is CRL?
28. X.509: What is the use of Next update date?
29. X.509: What kinds of password protection can be used in simple authentication
procedures?
30. X.509: What parts might have a nonce and what for they are intended?
31. X.509: What information is conveyed in open and what in close in one-way
strong authentication procedure?
32. X.509: What is the use of timestamps in three-way strong authentication
procedure?
33. X.509: What is the problem with three-way strong authentication procedure?
What is the remedy to it?
34. X.509: What is the use of criticality indicator in version 3?
35. X.509: What are the possible uses of keys?
36. X.509: What is key agreement?
37. X.509: What is Diffie-Hellman key exchange?
38. X.509: What is a primitive root?
39. OTP: What is the need for OTP schemes?
40. OTP: What is hash function chain?
41. OTP: Why only limited number of authentications is allowed by OTP schemes?
42. OTP: What is small number attack?
43. OTP: Who is authenticated to whom in Lamport’s OTP scheme?
44. OTP: What serves as one-time password of a client? Of a server?
45. OTP: Why server side password compromise is allowed?
46. MD5: What are restrictions on input message length?
47. MD5: What is the output length?
48. MD5: What is the general idea of MD5 hashing?
49. MD5: How initial message is partitioned for MD5 processing?
50. MD5: How many inputs-outputs HMD5 has?
51. MD5: How initialization of MD5 made?
52. MD5: What number is represented by A0 C1 if big- and little-endian assumptions
are used?
53. MD5: How many rounds HMD5 has?
54. MD5: What are the inputs to HMD5 rounds?
55. MD5: What is the difference between HMD5 rounds?
56. MD5: What are arrays T and X?
57. MD5: What is the use of additions modulo 232 in HMD5?
58. MD5: How Boolean functions defined by Table 12.1 are applied to 32-bit words?
59. MD5: What is the range of numbers in T? Why?
60. MD5: Get analytical representation of the function I in Table 12.1
61. MD5: Show that  3 is actually a permutation
62. DBControl: How can be limited privileges propagation?
63. DBControl: What is Bell-LaPadula model?
64. DBControl: What is *-property?
65. DBControl: How database schema is extended to comply with multilevel security
model?
66. DBControl: How TC value is calculated?
67. DBControl: What is apparent key?
68. DBControl: What are restrictions on apparent key?
69. DBControl: Why poly-instantiation may be required?
70. DBControl: What is filtering?
Download